
Ensuring cybersecurity for healthcare research data
Countering the threat
Real cybersecurity involves anti-fraud and anti-corruption compliance programs, but it also includes technical measures to protect your network. Make it difficult for attackers to gain a foothold in your system, by drawing an overall picture of the attack surface and identifying potential attackers. Also, threat actors can exploit system weaknesses, misconfigurations, and vulnerabilities to gain privileged access once they get into a system. Organizations should enhance privileged access management capabilities to include vendor remote access. Reduce likelihood of threat actors moving laterally in your system โ segment network access.ย With network segmentation, you can better isolate an incident, reduce attack surface, and prevent propagation of ransomware, for example. Mind your entire ecosystem and manage third-party risks. Vaccine R&D and manufacturing activities rely on many third parties. Threat actors often use organizations with weaker cybersecurity protocols as a back door to the ultimate targets. Assess the cyber posture of third parties. Also, remember to ย check your physical and digital connections to hospitals, which have come underย ransomware attacksย by foreign-based cybercriminals.
Cybersecurity on site and in the cloud
If we want to build real cybersecurity into our network architecture, we have to recognize the extent to which the way we use networks, and our expectations of them, has changed over recent years โ a change which has been considerably accelerated by the pandemic. When networks were originally designed and installed, they were contained within a silo inside the organizationโs walls, with appropriate policies, frameworks, and tools in place. Security was easier as every network path was owned by the organization and under its control. Then employees started moving and working from outside the building, creating rapid growth in cloud applications and cloud services delivering multiple functions. Branch offices also need to communicate with headquarters. Accordingly, cloud-based security tools have been developed to ensure that access to these services is done appropriately, using the right policy within the right framework[ii]. We need to merge and blend the traditional on-site environment and existing resources with newer cloud environments complete with the latest tools and the ways of working we are now experiencing.
Secure web gateways
One way to span these environments is to deploy secure web gateways (SWGs). These protect users from web-based threats in addition to applying and enforcing corporate acceptable use policies. Instead of connecting directly to a website, a user accesses the SWG, which is then responsible for connecting them to the desired website and performing functions such as URL filtering, web visibility, malicious content inspection, web access controls and other security measures. SWGs enable companies to:
- Block access to inappropriate websites or content based on acceptable use policies
- Enforce their security policies to make internet access safer
- Help protect data against unauthorized transfer
Applications at headquarters are accessed through aย remote access VPN. However, when users access cloud applications, they bypass the VPN and are exposed to risk. This is why organizations use SWGs: to provide secure internet access when users are disconnected from the VPN. One of the challenges of deploying SWG functionality is that it is typically set up as a stand-alone environment without coordinating workflows, reporting, or logging with other security infrastructure in the organization. This can lead to increased complexity over time as organizations often have multiple security point products that make their security operations less efficient and effective.
The emergence of SASE
More recently, a new approach for security infrastructure has emerged. This is known as SASE (pronounced โSassyโ), or secure access service edge, and combines networking and network security services into a single, cloud-delivered solution. This allows companies to deliver multiple types of security services from the cloud, such as SWG, advanced threat prevention,ย firewall as a serviceย (FWaaS), domain name system (DNS) security,ย cloud access security brokersย (CASB), data loss prevention (DLP) and others. This way, companies are able to control web access; provide users with secure connectivity; and protect all their traffic, users and applications from hostile websites and content, all from one cloud-based platform. The FWaaS component is a cloud-based implementation of firewall technology, which has long been used to protect computer networks. Traditionally Implemented either in hardware, software or both, a firewall acts as a barrier to prevent unauthorized access to the network. It does this by proactively monitoring all incoming and outgoing traffic as well as applying and enforcing an organizationโs security policies. Firewalls were originally created to protect on-site company networks, but as more companies moved their applications and data to the cloud, firewalls had to evolve. Now, firewall as a service, or FWaaS, enables firewalls to be delivered as part of a companyโs cloud infrastructure. The most advanced FWaaS implementations include next generation firewall (NGFW) capabilities. NGFWs offer the same functionalities as traditional firewalls, plus some more advanced features[iii]:
- Intrusion prevention system (IPS): Scans network traffic, identifies malware, and blocks it
- Deep packet inspection (DPI): Improves on packet filtering by analyzing the body of each packet in addition to the header
- Application awareness and control: Identifies and blocks traffic based on which applications the traffic is going to
- Threat intelligence feeds: Incorporates streams of updatedย threat intelligenceย to identify the latest threats
Aย SASE solutionย that provides SWG can offer protection in the cloud through a unified platform for complete visibility and precise control over web access while enforcing security policies that protect users from hostile websites. Using a SASE Solution brings many benefits. SASE offerings provide multiple advantages for enterprises, such as protection from advanced security threats, data loss and data theft, with a greatly reduced cost of deploying security at scale. Network management is streamlined, with complete visibility and precise control over the entire network. Teldatโs SASE solution allows users to digitalize with security. Based on our be.SAFE Premium architecture, it allows you to integrate security into your communications using SASE architecture, including secure web gateway (SWG) and next generation firewall (NGFW) services that let branch offices, retail locations and remote workers safely enjoy full public internet connectivity. References
[i] https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/how-to-prevent-cyber-attacks-on-vaccine-development.html [ii] https://www.healthcareitnews.com/news/himsscast-beginners-guide-sase-frameworks [iii] https://www.cloudflare.com/en-gb/learning/cloud/ngfw-vs-fwaas/

























